SSH (Secure Shell) is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another, providing strong authentication and a secure communications over insecure channels.
9d7c82113e8f96a67afb1ce99ceb348d95c8445a47a1a65acbcf84cb971bd5ee
The Linux kernel includes a powerful, filesystem independant mechanism for mapping logical files onto the sectors they occupy on disk, which can be subverted (with bmap and friends) to perform a variety of functions interesting to the computer forensics community and the computer security community.
45ffa75f71b46ae1e420cd0bc8d67620f9cdbc30d96a650decbc15647de77f0d
CRYPTOCard's CRYPTOAdmin pin can be decrypted from the .pdb file - Windows 9X demonstration program.
1c39bef81b495add319b132a0b439b84f5ac8247873637ae83f4dbc4f2ba012f
CRYPTOCard's CRYPTOAdmin software is a challenge/response user authentication administration system. The PT-1 token, which runs on a PalmOS device, generates the one-time-password response. A PalmOS .PDB file is created for each user and loaded onto their Palm device. By gaining access to the .PDB file, the legitimate user's PIN can be determined through a series of DES decrypts-and-compares. Using the demonstration tool, the PIN can be determined in under 5 minutes on a Pentium III 450MHz.
e6389d8ca2def0371d397ac69b9cc79c004fcfe85414c5e79412c03aaadabb09
hnsmarc.pl grabs current news from www.net-security.org, rewritten using the LWP-Package instead of lynx for increased portability and less resource usage.
7b1c19eca6bd1d3610ccded97b442d9e54dac4c5c9e159b8ec75620fb9509a8b
Exploit for Microsoft Index Server 2.0 hithighlight exploit (as described in ms00-006) which allows you to view any file in the wwwroot directory and down.
e7181e3f88d7f2f6f593e36b2e6ccf4c1078d50114bac13f45e6f4fa709a3e04
Microsoft Security Bulletin (MS00-023) - Microsoft has released a patch for a security vulnerability in Microsoft Internet Information Server. The vulnerability allows a malicious user to slow a web server's response or prevent it from providing service altogether. Microsoft FAQ on this issue available here.
da9189ad265b4177fbec8d84efe20feeeadb3bcd3ea5e77a1703a1bb0ef20e8b
Registry Analyzer is a program that can analyze a Windows 95/98 registry file (user.dat,system.dat). Use this program to read the registry database of another computer registry file.
15edd2e9858d837775512a85dbfaeb4dd0e39836e46c25a4eedd9e6951fa475d
TCPDump Filter is a program that filters hex output from tcpdump, and converts it to ASCII and displays it on the screen.
4dcee9ef07ede6bfe32a909c9b4a3b879696ff06ca05e2e9a443b4a6e98716ca
DoS.pl uses Net::RawIP to launch a syn flood attack.
32ae0c00c03fd1e282fef426d088787651a77b6b9c1400e9ef48c2c496d3e497
Building a Bastion Host Using HP-UX 11 - Covers configuring HP-UX 10 and 11 to be a secure host, useful for firewall gateways, web servers, ftp servers, dns servers, mail hubs, and more.
d1b8db73a010afb5da4be15559a94e2c098a450abb5a26cce22234cd6db501d7
The Sentinel project is designed to be a portable, accurate implementation of all publicly known promiscuous detection techniques. Sentinel currently supports 3 methods of remote promiscuous detection: The DNS test, Etherping test, and ARP test. Support for the ICMP Ping Latency test is under development.
6d5ba58d987fc714aa42799e13604eb61ef54d01b82002d7c9878e095880635b
Fortres 4.0 security software for Windows has an easily decrypted password. Qbasic source includeed to crack the simple encryption.
e2d86ed239ba13f4e4fead5544d33b1b698b5c7354b27dd04f8ea77839827da5